CVE-2026-27014

5.5 MEDIUM

📋 TL;DR

This vulnerability in NanaZip's ROMFS archive parser allows attackers to create malicious archives that cause infinite loops or stack overflows when processed. Users who open specially crafted ROMFS archives with vulnerable versions of NanaZip are affected. The issue can lead to denial of service or potentially arbitrary code execution.

💻 Affected Systems

Products:
  • NanaZip
Versions: 5.0.1252.0 to 6.0.1629.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All installations within the affected version range are vulnerable when processing ROMFS archives.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise if stack overflow can be leveraged for arbitrary code execution.

🟠

Likely Case

Denial of service through application crash or hang when processing malicious archives.

🟢

If Mitigated

Application crash with no further impact if proper sandboxing and memory protections are in place.

🌐 Internet-Facing: MEDIUM - Attackers could host malicious archives online, but user interaction is required to open them.
🏢 Internal Only: LOW - Requires user to open a malicious archive file, which is less likely in controlled environments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open a malicious archive. The advisory suggests potential for arbitrary code execution but doesn't confirm weaponization.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.0.1630.0

Vendor Advisory: https://github.com/M2Team/NanaZip/security/advisories/GHSA-fc89-3f57-h9q5

Restart Required: No

Instructions:

1. Download NanaZip version 6.0.1630.0 or later from the official repository. 2. Install the updated version. 3. Verify the installation shows version 6.0.1630.0 or higher.

🔧 Temporary Workarounds

Disable ROMFS archive processing

windows

Configure NanaZip to not process ROMFS archives if possible through settings or registry modifications.

Use alternative archive software

windows

Temporarily use other archive tools for ROMFS files until patched.

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of NanaZip in vulnerable versions.
  • Educate users to avoid opening ROMFS archives from untrusted sources and implement file type restrictions.

🔍 How to Verify

Check if Vulnerable:

Check NanaZip version in About dialog or via Windows Programs and Features. If version is between 5.0.1252.0 and 6.0.1629.0 inclusive, it's vulnerable.

Check Version:

Check via NanaZip GUI: Help → About NanaZip

Verify Fix Applied:

Confirm version is 6.0.1630.0 or higher in About dialog. Test with known safe ROMFS archives to ensure proper processing.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with stack overflow errors
  • High CPU usage from NanaZip process without completion
  • Windows Application Event Log entries showing NanaZip failures

Network Indicators:

  • Downloads of ROMFS archive files from untrusted sources

SIEM Query:

EventID=1000 OR EventID=1001 AND Source='Application Error' AND ProcessName='NanaZip.exe'

🔗 References

📤 Share & Export